Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 11:46

General

  • Target

    7745cf213dbcf4ff5ed623ede5ef1b71.exe

  • Size

    5.1MB

  • MD5

    7745cf213dbcf4ff5ed623ede5ef1b71

  • SHA1

    8680c856c3efb9574c3e7d6f43134e3b4e32f82d

  • SHA256

    1f21358bbe047db68a70e706e4b22658453082a6f110b02b8ac6acf5dd11f419

  • SHA512

    386560eebd87193c06e2cf88d823a2b9df4697d2d58349a5e5fe06bac259319752852c6f7072e461fbec6a278af6f0963f1a88c75fbbf5baaa3632a2e2709038

  • SSDEEP

    49152:dYmo8iZ5J+9+hGuLCzrhAmaVekwJ8/b/lEYZ3PlTay35bkrfg8FYri+ts5EjdZwS:dZiXMsCzroD530g2yOEjjs9/g3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe
    "C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe
      C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe

    Filesize

    3.0MB

    MD5

    199599f42aedd2b4efc61bba7afea9ae

    SHA1

    1fea2714083c9ba525be38f0e0a88643a4bcc90d

    SHA256

    87106d2360c8806b85c5af280968f9d52d0d9eec0cb61a2f00ad9235a5e0554a

    SHA512

    0306633eb3b8e515914e26372c5fa8a3a43bbb9d07a58c4b5f4244e0fe54b939a73b3a81188e4d24ca61f23363ba542f230596b51aea193b1806dfa3b32f3c09

  • C:\Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe

    Filesize

    2.2MB

    MD5

    7008b47d0b10574287aae7fcfe69aa57

    SHA1

    85c599adab3e59973c15c41baee5d1cd6b9057b5

    SHA256

    881c7d4e0fcd6d8b1b1af30894f3f6329b8ca49b0f35e4d8b6df8f8d50f6c7d7

    SHA512

    330f3947e1c36398288dcf5aea7032bfd054c742f901ae1596494dd49c9567d33a31e4e6a0e77b86b53bfb363022880b55622b47dfae2b5a5748a7ce6a7b722a

  • \Users\Admin\AppData\Local\Temp\7745cf213dbcf4ff5ed623ede5ef1b71.exe

    Filesize

    3.0MB

    MD5

    a10be7eaac881db543c7ddf9993eef7f

    SHA1

    d413ff0cb7b17033123fb26dc25731edb1aff978

    SHA256

    5a6da009e188ae3426eab23683b78dc691b6aeaaa7f7f9075bd09417c9360854

    SHA512

    fa360ad62ba431237c0398f32112e44ad82cbfb553403d076c3a9dec59c59d97e21b028fd19a592c154d2cd1c5ca90e8cb217102be8fdb8ca767b5e51aad9360

  • memory/1900-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1900-3-0x0000000002240000-0x000000000249A000-memory.dmp

    Filesize

    2.4MB

  • memory/1900-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1900-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1900-16-0x0000000004300000-0x0000000004C9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1900-43-0x0000000004300000-0x0000000004C9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2124-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2124-21-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2124-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB